Finding a Trusted and Shortest Path Mechanism of Routing Protocol for Mobile Ad Hoc Network

被引:6
作者
Shial, Rabindra Kumar [1 ]
Reddy, K. Hemant Kumar [1 ]
Gouda, Bhabani Sankar [1 ]
机构
[1] Natl Inst Sci & Technol, Dept CSE, Berhmpur, Orissa, India
来源
ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I | 2014年 / 248卷
关键词
Trust; mobile ad-hoc network; routing protocol. Security;
D O I
10.1007/978-3-319-03107-1_34
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A mobile ad-hoc network (MANET) is a contemporarily positioned in wireless network where A mobile ad-hoc network (MANET) is a contemporarily positioned in wireless network where nodes able to interact with each other without forming any frame such as access points or base stations. Nodes can unite and split the network at their convenience and they are free to move randomly. Nodes can even organize themselves randomly. This is a resistant of the changeable behavior of MANET, it is possible that there could be little malicious and selfish nodes that try conciliating the efficiency of the routing protocol and construct MANET defenseless to security assail. Therefore an any armed security-motivated AODV (Ad hoc On-demand Distance Vector Routing) routing protocol devised as R-AODV (Reliant Ad hoc On-demand Distance Vector Routing). The accomplishment of this work is tailored and relied on trusted mechanism known as direct and recommendations trust model which is integrated into AODV. This consents the AODV for discovering a shortest path along with its highest degree of reliability. The diversely designed modus operandi restricts the data to go through malicious nodes that intend to avert. The R-AODV protocol has been implemented and simulated on NS-2. Based on the simulation consequences, it can be shown that R-AODV does offer a steadfast data hopping in context to the customary AODV if there are malicious nodes in the MANET.
引用
收藏
页码:311 / 320
页数:10
相关论文
共 16 条
[1]   IEEE 802.11 ad hoc networks: Performance measurements [J].
Anastasi, G ;
Borgia, E ;
Conti, M ;
Gregori, E .
23RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, 2003, :758-763
[2]  
[Anonymous], 1997, IEEE Std 802.11
[3]  
[Anonymous], THESIS
[4]  
[Anonymous], 1996, Mobile Computing
[5]  
ASOKAN R., 2008, INT J COMPUTER SCI S, V2, P48
[6]  
BORGIA E, 2003, AD HOC NETWORKING
[7]  
Fall Kevin., 1999, NS NOTES DOCUMENTATI
[8]  
Gouda B.S., 2012, EMERGING TRENDS SCI
[9]  
Guang L., 2005, IEEE INT C WIR MOB C, V3
[10]  
Jacquet P., 2001, P IEEE INT TECHN 21